-
1
-
-
33745639957
-
Node compromise in sensor networks: The need for secure systems
-
C. Hartung, J. Balasalle, and R. Han, "Node Compromise in Sensor Networks: The Need for Secure Systems," Technical Report TR-CU-CS-990-05, Univ. of Colorado at Boulder, 2005.
-
(2005)
Technical Report TR-CU-CS-990-05, Univ. of Colorado at Boulder
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
3
-
-
0013091373
-
-
Nat'l Inst. of Standards and Technology
-
Nat'l Inst. of Standards and Technology, "FIPS Pub 198: The Keyed-Hash Message Authentication Code," http://csrc.nist. gov/publications/fips/fips198/fips-198a.pdf, 2002.
-
(2002)
FIPS Pub 198: The Keyed-Hash Message Authentication Code
-
-
-
4
-
-
84947254092
-
Key-insulated public key cryptosystems
-
Y. Dodis, J. Katz, S. Xu, and M. Yung, "Key-Insulated Public Key Cryptosystems," Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '02), pp. 65-82, 2002
-
(2002)
Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '02)
, pp. 65-82
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
Yung, M.4
-
5
-
-
31444433096
-
Protecting against key-exposure: Strongly key-insulated encryption with optimal threshold
-
DOI 10.1007/s00200-005-0183-y
-
M. Bellare and A. Palacio, "Protecting Against Key-Exposure: Strongly Key-Insulated Encryption with Optimal Threshold," Applicable Algebra in Eng., Comm. and Computing, vol. 16, no. 6, pp. 379-396, 2006. (Pubitemid 43152914)
-
(2006)
Applicable Algebra in Engineering, Communications and Computing
, vol.16
, Issue.6
, pp. 379-396
-
-
Bellare, M.1
Palacio, A.2
-
6
-
-
70449419951
-
Data security in unattended wireless sensor networks
-
Nov.
-
R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Data Security in Unattended Wireless Sensor Networks," IEEE Trans. Computers, vol. 58, no. 11, pp. 1500-1511, Nov. 2009.
-
(2009)
IEEE Trans. Computers
, vol.58
, Issue.11
, pp. 1500-1511
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
7
-
-
49149089237
-
Catch me (if you can): Data survival in unattended sensor networks
-
R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch Me (If You Can): Data Survival in Unattended Sensor Networks," Proc. IEEE Sixth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '08), pp. 185-194, 2008
-
(2008)
Proc. IEEE Sixth Ann. Int'l Conf. Pervasive Computing and Comm. (PerCom '08)
, pp. 185-194
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
8
-
-
65249138169
-
New adversary and new threats: Security in unattended sensor networks
-
Mar.
-
D. Ma, C. Soriente, and G. Tsudik, "New Adversary and new Threats: Security in Unattended Sensor Networks," IEEE Network, vol. 23, no. 2, pp. 43-48, Mar. 2009.
-
(2009)
IEEE Network
, vol.23
, Issue.2
, pp. 43-48
-
-
Ma, D.1
Soriente, C.2
Tsudik, G.3
-
9
-
-
58149086240
-
POSH: Proactive co-operative self-healing in unattended wireless sensor networks
-
R. Di Pietro, D. Ma, C. Soriente, and G. Tsudik, "POSH: Proactive Co-Operative Self-Healing in Unattended Wireless Sensor Networks," Proc. IEEE 27th Symp. Reliable Distributed Systems (SRDS '08), pp. 185-194, 2008
-
(2008)
Proc. IEEE 27th Symp. Reliable Distributed Systems (SRDS '08)
, pp. 185-194
-
-
Di Pietro, R.1
Ma, D.2
Soriente, C.3
Tsudik, G.4
-
10
-
-
58049110209
-
Dish: Distributed self-healing
-
D. Ma and G. Tsudik, "Dish: Distributed Self-Healing," Proc. 10th Int'l Symp. Stabilization, Safety, and Security of Distributed Systems (SSS '08), pp. 47-62, 2008.
-
(2008)
Proc. 10th Int'l Symp. Stabilization, Safety, and Security of Distributed Systems (SSS '08)
, pp. 47-62
-
-
Ma, D.1
Tsudik, G.2
-
11
-
-
38549139180
-
Constant storage self-healing key distribution with revocation in wireless sensor network
-
DOI 10.1109/ICC.2007.223, 4288894, 2007 IEEE International Conference on Communications, ICC'07
-
R. Dutta, Y.D. Wu, and S. Mukhopadhyay, "Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network," Proc. IEEE Int'l Conf. Comm. (ICC '07), pp. 1323-1328, 2007. (Pubitemid 351145719)
-
(2007)
IEEE International Conference on Communications
, pp. 1323-1328
-
-
Dutta, R.1
Wu, Y.D.2
Mukhopadhyay, S.3
-
12
-
-
3042593365
-
Whisper: Local secret maintenance in sensor networks
-
V. Naik, A. Arora, S. Bapat, and M.G. Gouda, "Whisper: Local Secret Maintenance in Sensor Networks," IEEE Distributed Systems Online, vol. 4, no. 9, 2003.
-
(2003)
IEEE Distributed Systems Online
, vol.4
, Issue.9
-
-
Naik, V.1
Arora, A.2
Bapat, S.3
Gouda, M.G.4
-
13
-
-
33744928874
-
Robomote: Enabling mobility in sensor networks
-
DOI 10.1109/IPSN.2005.1440957, 1440957, 2005 Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005
-
K. Dantu, M.H. Rahimi, H. Shah, S. Babel, A. Dhariwal, and G.S. Sukhatme, "Robomote: Enabling Mobility in Sensor Networks," Proc. Fourth Int'l Symp. Information Processing in Sensor Networks (IPSN '05), pp. 404-409, 2005. (Pubitemid 43841262)
-
(2005)
2005 4th International Symposium on Information Processing in Sensor Networks, IPSN 2005
, vol.2005
, pp. 404-409
-
-
Dantu, K.1
Rahimi, M.2
Shah, H.3
Babel, S.4
Dhariwal, A.5
Sukhatme, G.S.6
-
14
-
-
0036055524
-
Coverage control for mobile sensing networks
-
J. Cortés, S. Mart́nez, T. Karatas, and F. Bullo, "Coverage Control for Mobile Sensing Networks," Proc. IEEE Int'l Conf. Robotics and Automation (ICRA '02), pp. 1327-1332, 2002. (Pubitemid 34916432)
-
(2002)
Proceedings - IEEE International Conference on Robotics and Automation
, vol.2
, pp. 1327-1332
-
-
Cortes, J.1
Martinez, S.2
Karatas, T.3
Bullo, F.4
-
15
-
-
25644433619
-
Sensor relocation in mobile sensor networks
-
Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
-
G. Wang, G. Cao, T.F. La Porta, and W. Zhang, "Sensor Relocation in Mobile Sensor Networks," Proc. IEEE INFOCOM, pp. 2302-2312, 2005. (Pubitemid 41382347)
-
(2005)
Proceedings - IEEE INFOCOM
, vol.4
, pp. 2302-2312
-
-
Wang, G.1
Cao, G.2
La Porta, T.3
Zhang, W.4
-
16
-
-
0344876649
-
Studying the feasibility of energy harvesting in a mobile sensor network
-
M.H. Rahimi, H. Shah, G.S. Sukhatme, J.S. Heidemann, and D. Estrin, "Studying the Feasibility of Energy Harvesting in a Mobile Sensor Network," Proc. IEEE Int'l Conf. Robotics and Automation (ICRA '03), pp. 19-24, 2003.
-
(2003)
Proc. IEEE Int'l Conf. Robotics and Automation (ICRA '03)
, pp. 19-24
-
-
Rahimi, M.H.1
Shah, H.2
Sukhatme, G.S.3
Heidemann, J.S.4
Estrin, D.5
-
17
-
-
56749181478
-
Emergent properties: Detection of the node-capture attack in mobile wireless sensor networks
-
M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei, "Emergent Properties: Detection of the Node-Capture Attack in Mobile Wireless Sensor Networks," Proc. First ACM Conf. Wireless Network Security (WISEC '08), pp. 214-219, 2008.
-
(2008)
Proc. First ACM Conf. Wireless Network Security (WISEC '08)
, pp. 214-219
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
18
-
-
69849084397
-
The quest for mobility models to analyse security in mobile ad hoc networks
-
M. Conti, R. Di Pietro, A. Gabrielli, L.V. Mancini, and A. Mei, "The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks," Proc. Seventh Int'l Conf. Wired/Wireless Internet Comm. (WWIC '09), pp. 85-96, 2009.
-
(2009)
Proc. Seventh Int'l Conf. Wired/Wireless Internet Comm. (WWIC '09)
, pp. 85-96
-
-
Conti, M.1
Di Pietro, R.2
Gabrielli, A.3
Mancini, L.V.4
Mei, A.5
-
19
-
-
70449346913
-
Mobility and Cooperation to Thwart Node Capture Attacks in MANETs
-
article 8
-
M. Conti, R. Di Pietro, L.V. Mancini, and A. Mei, "Mobility and Cooperation to Thwart Node Capture Attacks in MANETs," EURASIP J. Wireless Comm. and Networking, vol. 2009, article 8, 2009.
-
(2009)
EURASIP J. Wireless Comm. and Networking
, vol.2009
-
-
Conti, M.1
Di Pietro, R.2
Mancini, L.V.3
Mei, A.4
-
20
-
-
67650465277
-
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
-
R. Di Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1463-1475, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1463-1475
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
21
-
-
77953295155
-
Intrusion-resilience in mobile unattended WSNs
-
R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, "Intrusion-Resilience in Mobile Unattended WSNs," Proc. IEEE INFOCOM, pp. 2303-2311, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 2303-2311
-
-
Di Pietro, R.1
Oligeri, G.2
Soriente, C.3
Tsudik, G.4
-
22
-
-
78650530349
-
Securing mobile unattended wsns against a mobile adversary
-
R. Di Pietro, G. Oligeri, C. Soriente, and G. Tsudik, "Securing Mobile Unattended WSNs against a Mobile Adversary," Proc. IEEE 29th Symp. Reliable Distributed Systems (SRDS '10), pp. 11-20, 2010.
-
(2010)
Proc. IEEE 29th Symp. Reliable Distributed Systems (SRDS '10)
, pp. 11-20
-
-
Di Pietro, R.1
Oligeri, G.2
Soriente, C.3
Tsudik, G.4
-
23
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
DOI 10.1002/wcm.72
-
T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Comm. and Mobile Computing (WCMC), Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, pp. 483-502, 2002. (Pubitemid 135713186)
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
24
-
-
4444358549
-
Time synchronization in sensor networks: A survey
-
July/Aug.
-
F. Sivrikaya and B. Yener, "Time Synchronization in Sensor Networks: A Survey," IEEE Network, vol. 18, no. 4, pp. 45-50, July/Aug. 2004.
-
(2004)
IEEE Network
, vol.18
, Issue.4
, pp. 45-50
-
-
Sivrikaya, F.1
Yener, B.2
-
26
-
-
75149140941
-
Shortpk: A short-term public key scheme for broadcast authentication in sensor networks
-
Jan.
-
R. Wang, W. Du, X. Liu, and P. Ning, "ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks," ACM Trans. Sensor Networks, vol. 6, pp. 9:1-9:29, Jan. 2010.
-
(2010)
ACM Trans. Sensor Networks
, vol.6
, pp. 91-929
-
-
Wang, R.1
Du, W.2
Liu, X.3
Ning, P.4
-
27
-
-
84880904783
-
OAEP Reconsidered
-
Advances in Cryptology - CRYPTO 2001
-
V. Shoup, "OAEP Reconsidered," Proc. 21st Ann. Int'l Cryptology Conf. (CRYPTO '01), pp. 239-259, 2001. (Pubitemid 33317919)
-
(2001)
Lecture Notes In Computer Science
, Issue.2139
, pp. 239-259
-
-
Shoup, V.1
-
29
-
-
19944369062
-
Soft tamper-proofing via program integrity verification in wireless sensor networks
-
DOI 10.1109/TMC.2005.44
-
T. Park and K.G. Shin, "Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 4, no. 3, pp. 297-309, May/June 2005. (Pubitemid 40750777)
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.3
, pp. 297-309
-
-
Park, T.1
Shin, K.G.2
-
30
-
-
3042738543
-
Swatt: Software-based attestation for embedded devices
-
A. Seshadri, A. Perrig, L. van Doorn, and P.K. Khosla, "Swatt: Software-Based Attestation for Embedded Devices," Proc. IEEE Symp. Security and Privacy (SP '04), pp. 272-282, 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy (SP '04)
, pp. 272-282
-
-
Seshadri, A.1
Perrig, A.2
Van Doorn, L.3
Khosla, P.K.4
-
31
-
-
47249110641
-
Distributed software-based attestation for node compromise detection in sensor networks
-
Y. Yang, X. Wang, S. Zhu, and G. Cao, "Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks," Proc. IEEE 26th Symp. Reliable Distributed Systems (SRDS '07), pp. 219-230, 2007.
-
(2007)
Proc. IEEE 26th Symp. Reliable Distributed Systems (SRDS '07)
, pp. 219-230
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
|